Ethernet Algorithm for Building Network Integration Using TCP/IP

Size: px
Start display at page:

Download "Ethernet Algorithm for Building Network Integration Using TCP/IP"

Transcription

1 International Journal of Control, Ethernet Automation, Algorithm and for Systems, Building Network vol. 4, no. Integration 1, pp , Using February TCP/IP Ethernet Algorithm for Building Network Integration Using TCP/IP Kyung-Bae Chang, Il-Joo Shim, and Gwi-Tae Park Abstract: Problems like poor security, transfer delay or packet loss occur while building network systems that are applied with TCP/IP integrate with data network systems. To solve this problem, this paper proposes the Separated Ethernet, which can give priority to the system, and by using the OPNET Modeler simulator, we will verify its performances. Keywords: Building network, control network, ethernet, building integration. 1. INTRODUCTION Recently, building industries and building management industries have made great developments. Many facilities and instruments are installed to one building, and the cost for energy and management has been going up. Because of this, a more economic managing, and efficient integration system was required. Therefore the buildings are developing into forms of intelligent building systems. To obtain efficient management and energy preservation, intelligent building systems like these need to integrate the facilities and instruments. For integrated use, information between each of the facilities must be shared, and in order to do so, a network is required. In a building, networks are divided by its facility s functions into control networks and data networks. At present, building automated systems (BAS) use various control protocols provided by its manufacturers. And the control networks and data networks are completely separated, as shown in Fig. 1, for security reasons. In order to integrate these independent networks, a separate network device is required, and the network structures must be overlapped according to their types. Therefore a spec shared, open protocol is inevitable for an integrated and efficient system. Integration has been applied on actual buildings, and research for a more compatible integration is in progress. Also, research on the use of control open protocols, like LonWorks and BACnet, for more efficient integration is in progress [1,2]. Among these researches, there are studies on the use of Ethernet, which is widely used as TCP/IP, on the control network [3-5]. As Ethernet and TCP/IP are widely Manuscript received February 22, 2005; revised September 29, 2005; accepted October 10, Recommended by past Editor-in-Chief Myung Jin Chung. Kyung-Bae, Il-Joo Shim, and Gwi-Tae Park are with the School of Electrical Engineering, Korea University, 1, 5-ka, Anam-dong, Sungbuk-ku, Seoul , Korea ( s: {lslove, ijshim, gtpark}@korea.ac.kr). used throughout Korea, and almost every building has TCP/IP installed, many existing building s network systems integrate the lower protocols by using the upper Ethernet and TCP/IP. Accordingly, in order to solve the problems of applying TCP/IP to the building control network, research on the possibilities of integrating the entire building control system into TCP/IP is in progress [6,7]. This paper proposes the Separated Ethernet, which can integrate the entire network in the building into TCP/IP protocol, and verifies its performance with a network simulator. The proposed Ethernet has been developed to be compatible with the existing Ethernet. Also it is developed to use the character of both, the data network, which has random traffic on random moments, and the control network, which has low traffic on regular time. The proposed method has less wiring, convenient management and better flexibilities, because integrating and expanding the entire control network system becomes easier and the integration between the control network and data network becomes possible. Internet Router FireWall NMS Web SI L2 Hub MDF MDF Control Network HVAC Data Network Clustering Repeater Light PC PC PC PC PC PC Fig. 1. The control networks and data networks are completely separated in building network system. Power

2 64 Kyung-Bae Chang, Il-Joo Shim, and Gwi-Tae Park 1.1. Building network systems Building network systems can be classified into two groups, the control network and the data network. The control network is a network where communication between, a facility needed in a building automated system and the server that controls them, are made. Open protocols like BACnet, LonWorks are used in the control network. The data network is an internet connected network, which is capable of services like www, ftp, telnet or . TCP/IP is the most wellknown open protocol for the data network. The features of both the networks are as shown in Table The advantages of integrating the data network and control network If the two networks integrate into one, an integrated management of all the facilities and machinery in the building will become possible. Also, by this, a more flexible network structure becomes possible, and the amount of wiring reduces. With the low amount of wiring, basic building costs become lower, and the modification and expansion of the network becomes mush easier. If there are two separate networks, the gateway Web must transfer information between the networks, and therefore the gateway must maintain a center concentrating form. As all the information attempts to go through this gateway, the flow of information becomes clogged. However if the two networks are integrated, installation according to the amount of data transfer becomes possible. And therefore the efficiency of the web increases. Also, because the Web takes dispersive forms according to its purpose, the data clogging problem can be solved. The cost reduces as well, because of the lower requirements of the Web The problem that arises when the control network integrates with the data network. Control facilities become exposed to virus, cracking and malignancy codes when the control network Table 1. Differences between control network and data network. Data network Control network Amount of information Much information Little information Transfer frequency Irregular Regular Delay time Non real time Real time Feedback Handling information for documents or control, Purpose of high volume commands use data on a between nodes, computer or and optimized printer. data. integrates with the data network, which is connected to the internet. Control facilities and devices require higher levels of security than the data network, because they have direct and physical relationships with important users. Also, due to the importance of the control information data in the control network, even a little loss can be crucial. Therefore, in order to satisfy the control network s standards, reliable transmission and transmission delay between the transmitter and receiver is required [10]. If the two networks are integrated and there is a lot of traffic on the data network system, collision and delays occur during the packet transmissions. And if a lot of collisions occur, there may be packet loss. This is the biggest problem with the control network [8,11] The possibility of the integration of data network and control network. The integration of data networks and control networks has a lot of advantages, therefore building network systems may improve. But there are still problems like low security, transfer delays and packet losses. In this paper, we are trying to find a solution to this matter, and will seek its possibilities. The first problem is security. Security problems occur because of the connection with the internet. To solve this problem, the connection to the internet must be disconnected, and the facilities must be watched over carefully with a continuous security policy. However, if the two different network systems integrate, the two networks become connected physically. Therefore we propose the method of dividing the two networks logically. Physically, the two networks share a same bus line, but the transmission in bus line is sent in two separate packets. This is how we divide the data packets and control packets. Fig. 2 shows a logically divided host. On the OSI 7 Layer, Layer1 and Layer2 is connected to a single bus physically, but Layer3 and its upper layers are divided Data Network Application TCP, UDP IP HOST Enhanced Ethernet Ethernet Controller Fig. 2. The logically divided host. Control Network Application TCP, UDP IP LAN BUS

3 Ethernet Algorithm for Building Network Integration Using TCP/IP 65 in two, and are received from the Ethernet by the use of two ues. The frames that transfer through the bus line are transmitted in two divided networks. The second problem is transmission delay and packet loss, which is an important element in the control network. This problem can be solved by giving priorities to the control network. In this method, priorities are given to each of the Layers on the OSI 7 Layer. By giving a high priority of the use of bus to Layer1 and Layer2, the control network s delay becomes a minimum and packet loss does not occur. If priority is given to the control packet by L3 switch Hub and Gateway, which is in layer3 of the OSI 7 Layer, the network layer, transmission delay and packet loss become minimized to the control packet standard. This paper proposes an algorithm, which can give priorities to IEEE standard, which is in charge of layer1 and layer2, in a TCP/IP applied building integration control system. A Separated Ethernet with two different upper layers is designed for logical dividing. By the use of this Separated Ethernet, integration of the data network and control network is presented. Also, the performances and behaviors of this designed Separated Ethernet can be verified by simulation. 2. SEPARATED ETHERNET 2.1. Dual ue structure and ue Priority In building network systems, security is improved by integrating the two networks logically. We propose a method, which has independent upper layers of the control network and data network for improved security. Fig. 3 shows a dual structure ue. If the data network s ue is disabled, and the data network frame is received from the Separated Ethernet, as the data is not transmitted to the upper layers, malignancy codes and virus s attacks have no effect on the station. If there is the same data in both the data network s and control network s ue, priority must be given to the Control Network High Priority Enhanced Ethernet Ethernet Controller Data Network Low Priority Fig. 3. The dual structure ue and Priority. LAN BUS control network by extracting, fragmentation and transmitting the data from the control network Backoff Priority Not like the MAC protocols that act in order, like Token Bus or Token Ring, Ethernet is a competitive MAC protocol, which gives priorities according to its mechanism. Ethernet gives priority to the station that attempts transmission first, and if a collision occurs by transmission delay or by transmitting at the same time, priority is decided by a BEB (Binary Exponential Backoff) algorithm. If a collision occurs, the station stands by for a random time and re-transmits. We will study how this process happens. When a collision occurs, time divides into discontinuous slots, each slot having the same length as the worst round trip transmission time. In order to receive the longest pass under regulation by the IEEE standard (2.5km, 4 repeaters), slot time is fixed at 512 bit time, or 51.2 us. After the first collision, each station waits 0 or 1 slot times before attempting again. If two stations collide and the two stations select the same number, another collision occurs. After the second collision, each station selects a number between 0,1,2 or 3 and stands by for an equal slot time as the selected number. Now, the probability of another collision happening by selecting a same number is If a third collision occurs with these possibilities, the section of slot time selection is between 0 and Generally, after i times of collisions a random number between 0 and 2 i -1 is selected, and the same number of slots pass. However, after 10 collisions the random section is fixed to the maximum value, which is 1,023 slots. After 16 collisions, the controller gives up and sends an abandonment signal to the computer. Afterwards recover process is up to a more upper level. This algorithm, which is called a Binary exponential backoff, has been selected to dynamically receive the number of stations to transmit. If the random section to every collision is equally 1,023, the possibility of two different stations colliding twice becomes negligible. However as a long slot time must be waited for even one collision, the efficiency drops. On the contrary, if there are many station numbers that attempt re-transmission to a small random section of under 4 in collision, transmission will become almost impossible from the continued collisions. Therefore, r, the value selected in random, increases in binary exponential proportions with the collision number, with efficiency. Sometimes, like with a wireless environment IEEE standard , priorities must be given. Research on giving priority by improvement of the BEB algorithm is progress, as BEB is used in deciding priorities on the collision of wireless LAN too [12]. These, Backoff-based priority schemes are methods in which the stations with a high priority of

4 66 Kyung-Bae Chang, Il-Joo Shim, and Gwi-Tae Park Transmission Packet Collision JAM n Control Network time slot Contention Slot time Data Network time slot Packet Fig. 4. Competitive state resulting from the collision of Separated Ethernet. deciding the Backoff slot time, compete in a shorter slot time. When a collision occurs on the improved BEB algorithm, the re-transmission time is decided by the number of collisions. If the fixed window size in a competitive situation is W, and r is the random slot time, the station s re-transmission times i and j can be shown as T i and T j. If i station s priority is higher than station j s, the equation can be shown as (1). T i = W r i < T j = W r j (1) Window size W is fixed, it can be shown as in (2). r i < r j (2) In the proposed S Ethernet, the control network transmitting station s random slot time value is r c, and the data network transmitting system s is r d. The random slot time is decided by the number of retransmissions n, and is shown as (3) and (4). r c = random( ) (3) r d = random( ) (4) Namely, the control network with a higher priority gets the lower competitive section. Fig. 4 shows the giving of priority, to the Backoff algorithm applied to the building network system Separated Ethernet frames All the frames transmitted on the channel for the integration of building networks must be classified into data network frame and control network frame. Fig. 5 shows the Separated Ethernet frame s structure. It is a form of which, a 2 byte field called Network is added to the existing Ethernet. The contents of this field are shown in Table 2. The values of Network 1 and 2 are used to discriminate control network and data network. The control value is a designated value, which is used to Table 2. Network field values of the Separated Ethernet. Name Code Description Network 1 0x00 Control Network Network 2 0x01 Data Network Control 0x10 Ext - Ethernet add the MAC algorithm, an algorithm that can form the most suitable network by establishing the Separated Ethernet s constant value. 3. SIMULATION The proposed Separated Ethernet is verified using OPNET s OPNET Modeler simulator. A LAN environment, which is consisted by 10 stations of 10MBps Link Models, is simulated under different scenarios of node model and created packet amount settings. To understand and valuate the performances of the Separated Ethernet, 4 scenarios have been made. Fig. 6 shows the simulating process of OPTNET simulator. One model from the existing Ethernet and three models of Separate Ethernet applied ones were used in the node model simulation. Separate Ethernet applied (Direct Digital Controller) indicates the control facilities used in buildings, and the Separated Ethernet applied Client PCs indicates the data processing facilities. Web is the device that connects these two networks. In the results estimated in the simulation, the values are numbers of transmitted packets, and of collisions in each station, and the mean value of the End-to End Delay, which is the time during which packets of two networks are transmitted Confirming the ue s priority In the scenario of confirming the ue s priority, packets are generated from the upper two layers of the Web and is input to ue, from a network environment consisted of five s, four Client PCs Separated Ethernet Frame Preamble SFD Destination Address Source Address Type Network Data CRC 7 Byte 1 Byte 6 Byte 6 Byte 2 Byte 2 Byte 46 ~ 1500 Byte 4 Byte Fig. 5. The structure of Separated Ethernet. Fig. 6. Simulation environment.

5 Ethernet Algorithm for Building Network Integration Using TCP/IP 67 Fig. 7. Node models used in simulation. Fig. 9. Results of scenario 2. Fig. 8. Results of scenario 1. and one Web. The packets are generated every 5 seconds for 100Bytes, from both the control network packet and data network packet. This scenario s result is shown in Fig. 8. The control network s End-to-End Delay average is 0.103[ms], the data network s End-to-End Delay average is 0.215[ms]. The control network s packet has been transmitted twice faster than the data network packet. The two packets have a regular Delay value, which is because there were no collision on the LAN, due to the packet s being generated from a single station Confirming the Backoff Priority In the scenario of confirming the Backoff s priority, each packet is generated every second for 1024 Bytes, from the stations of control facilities and data facilities of a LAN environment of and five Client PCs. The End-to-End Delay average is shown on Fig. 9. These results confirm that the control network s transmission time is always shorter than that of the data network, as the control network s Delay value is 1.602[ms] and the data network s Delay value is 3.595[ms] Separated Ethernet s performances under overload To study the performances of the Separated Ethernet under a sudden, big amount of traffic on the data network, five control facilities and 5 data facilities are connected to one bus. The control facility station generates 100 byte packets every 0.1[sec], and beginning at 600 seconds all the stations of the data networks generate 1024 byte packets every 0.1[ms]. The End-to-End Delay average is shown in Fig. 10, and the amount of packet loss is shown on Fig. 11. As shown in Fig. 10, the control network s delay increases as the data network s packets become generated. But the results show a big distinction of 36.7[ms] and 236[sec]. Also, the data network s packet loss remains but the control network does not have any packet losses. Fig. 10. Results from scenario 3 s transfer delay2. Fig. 11. Packet loss from scenario 3.

6 68 Kyung-Bae Chang, Il-Joo Shim, and Gwi-Tae Park 3.4. Comparison between Ethernet and Separated Ethernet To compare the performances of the existing Ethernet and Separated Ethernet, the same amount of data has been generated for the same amount of intervals from the two LANs, each composed of Ethernet and Separated Ethernet, and the End-to-End Delay of the two LANs have been measured. Two kinds of simulations were conducted, one where all the stations generate packets of a low, 1024Byte data every second, and one where packets of 1024Byte data are generated every 6 seconds. Fig. 12 shows the results of scenario 4 under low traffic. The existing Ethernet s transmission delay is smaller than the proposed S-Ethernet, but its differences are much smaller than the total transmission delay. Fig. 13 shows the results of scenario 4 under high Fig. 12. Results of scenario 4 under low traffic. Fig. 13. Results of scenario 4 under high traffic. traffic. As the traffic increases, the transmitting delay of the two Ethernet methods become bigger, but this difference is too small comparing to the total transmission delay. In other words, there is little difference in the performances of the existing Ethernet and the Separated Ethernet. By these results, we could confirm that the control network s packets have a fast and stable transmitting speed, even when a lot of packets are generated from the data network by the priority given to the ue and Backoff algorithm. Also, there were little differences with the performances of the existing Ethernet. 4. CONCLUSION & FUTURE WORKS This paper proposed the integration of the building s control network and data network. We detected some problems that occur with the integration of the two networks, like transmitting delay, packet loss and security matter. We proposed the Separated Ethernet to solve these problems. Ethernet MAC Protocol, which is in charge of layer1 and layer2 of the OSI 7 layer has been logically divided with the network, and the control network system has been prioritized on the Separated Ethernet. The Separated Ethernet has been designed by adding Backoff Priority, double ue and ue priority functions to the existing Ethernet. The designed Separated Ethernet s logical dividing and priority giving functions have been verified by OPNET Modeler, by separate scenarios. REFERENCES [1] [2] [3] F. L. Lian, J. R. Moyne, and D. M. Tibury, Performance evaluation of control networks, IEEE Control System Magazine, vol. 21, no. 1, pp , [4] G. C. Lee, T. J. Kim and S. Lee, Performance evaluation of switched ethernet for real time industrial communication, Journal of Control. Automation and Systems Engineering (in Korean), vol. 9, no. 1, pp , [5] N. Krommenacker, T. Divoux, and E. Rondeau, Using genetic algorithms to design switched ethernet industrial networks, Proc. of the IEEE International Symposium on Industrial Electronics, vol. 1, pp , [6] IBS Korea, Environment Friendship Type Smart Building Technical Development Research Paper, Construction Technology Research and Development Business Research Paper, [7] C. S. Leem, Performance evaluation of building network system integration using TCP/IP, Master s thesis, Dept. of Electrical Engineering,

7 Ethernet Algorithm for Building Network Integration Using TCP/IP 69 Korea University, [8] K. H. Lee, J. S. Shon, and W. T. Hwang, Construction-Information-Equipment System of Intelligent Building, Kimoondang, [9] IBS Korea, Entrance and Application of Intelligent Building System, Kitari Book Company, [10] W. S. Song, S. H. Hong and S. T. Bushby, NISTIR 7038: A Simulation Analysis of BACnet Local Area Networks, National Institute of Standards and Technology, [11] W. Zhang, M. S. Branicky, and S. M. Philips, Stability of networked control system, IEEE Control System Magazine, vol. 21, pp , [12] Y. Xiao, Backoff-based priority schemes for IEEE , Proc. of the International Conference of Communications, vol. 3, pp , Gwi-Tae Park received the B.S., M.S. and Ph.D. degrees in Electrical Engineering from Korea University in 1975, 1977 and 1981, respectively. He was a Technical Staff Member in the Korea Nuclear Power Laboratory and an Electrical Engineering Faculty Member at Kwangwoon University, in 1975 and 1978, respectively. He joined Korea University in 1981 where he is currently a Professor in Electrical Engineering. He was a Visiting Professor at the University of Illinois, UC and the University of Maryland, in 1984 and 1996, respectively. Dr. Park is presently serving as the President of the Intelligent Building System (IBS)-Korea. His research interests include soft computing technique and its application to semiconductor processes, adaptive signal processing, computer & control networks and their applications to robots, home automation, security systems, smart car, and IBS. He was a recipient of KIEE Paper Award and Academic Achievement Award. He is a member of KIEE, ICASE, and KFIS. Kyung-Bae Chang received the B.S. degree in Electrical Engineering from Hong-Ik University, Korea, and the M.S. degree in Mechatronics Engineering from GIST (Gwang-Ju Institute of Science and Technology), Korea. He is currently a Ph.D. candidate in the Electrical Engineering, Korea University. He was with Hyundai Autonet, Korea, from His research interests include Safety Electronics System, Testing, Quality Assurance, Reliability Modeling and Analysis, Intelligent Building System, Embedded System and Ubiquitous Computing. Il-Joo Shim received the B.S. and M.S. degrees in Electrical Engineering from Korea University at Seoul, in 1987 and 1989, respectively. From 1989 to 1999, he was a Senior Engineer at LG Industrial Systems, where his activities included the design and development of distribution automa-tion system (DAS). Since 1999, he is a Ph.D. candidate in the School of Electrical Engineering at Korea University. From 2001 to 2002, he is a Research Professor in the School of Information & Communication Engineering at Daeduk College. Since 2003, he is a Research Professor in the School of Electrical Engineering at Suwon University. His research interests include webbased remote control, power quality monitor, digital protective relay, intelligent building system (IBS), contextaware and Ubiquitous computing systems. He is a member of KIEE, ICASE and IEEE.

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Fast Device Discovery for Remote Device Management in Lighting Control Networks

Fast Device Discovery for Remote Device Management in Lighting Control Networks J Inf Process Syst, Vol.10, No.4, pp.00~00, December 2014 http://dx.doi.org/10.3745/jips.03.0011 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Fast Device Discovery for Remote Device Management in

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.5: Ethernet Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Lecture 6 Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link

More information

Ethernet. Introduction. CSE 3213 Fall 2011

Ethernet. Introduction. CSE 3213 Fall 2011 Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes CS 4: COMPUTER NETWORKS SPRING 03 FINAL May 6, 03 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable justification.

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1 Media Access Control Sub Layer COMP476 Networked Computer Systems Sharing Common Media There are several ways to share common media. Some methods are: Frequency division multiplexing Time division multiplexing

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Media Access Control (MAC) Sub-layer and Ethernet

Media Access Control (MAC) Sub-layer and Ethernet Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF MAC Sub-layer The MAC sub-layer is a sub-layer

More information

Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak

Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak Abstract: TCP/IP (Transmission Control Protocol/Internet

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution

More information

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker Code No: N0421/R07 Set No. 1 IV B.Tech I Semester Supplementary Examinations, March 2013 COMPUTER NETWORKS ( Common to Electronics & Communication Engineering, Electronics & Instrumentation Engineering,

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

What is a Network? A connection of two or more computers so that they can share resources.

What is a Network? A connection of two or more computers so that they can share resources. NETWORKS What is a Network? A connection of two or more computers so that they can share resources. Network Benefits Remote access Sharing files & resources Communication Cost Maintenance Communication

More information

Decision of Maximum Congestion Window Size for TCP Performance Improvement by Bandwidth and RTT Measurement in Wireless Multi-Hop Networks

Decision of Maximum Congestion Window Size for TCP Performance Improvement by Bandwidth and RTT Measurement in Wireless Multi-Hop Networks 34 International Journal of Information Processing Systems, Vol.2, No.1, March 2006 Decision of Maximum Congestion Window Size for TCP Performance Improvement by Bandwidth and RTT Measurement in Wireless

More information

Collision Free and Energy Efficient MAC protocol for Wireless Networks

Collision Free and Energy Efficient MAC protocol for Wireless Networks 110 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 Collision Free and Energy Efficient MAC protocol for Wireless Networks Muhammad Ali Malik, Dongha Shin

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

SYSTEMS ADMINISTRATION USING CISCO (315)

SYSTEMS ADMINISTRATION USING CISCO (315) Page 1 of 10 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1.

More information

Data and Computer Communications. Chapter 11 Local Area Network

Data and Computer Communications. Chapter 11 Local Area Network Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the

More information

Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1

Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1 455 Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1 Assistant Professor, Department of Computer Science and Engineering Punjabi University

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes CS 421: COMPUTER NETWORKS SPRING 2015 FINAL May 21, 2015 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

Local Area Network(LAN)

Local Area Network(LAN) Local Area Network(LAN) A local area network (LAN) is a computer network that interconnects computers within a limited area. Example: a residence, school, laboratory, university campus,office building

More information

Dynamic Traffic Prioritization and TXOP Allocation in e Based Multihop Wireless Networks

Dynamic Traffic Prioritization and TXOP Allocation in e Based Multihop Wireless Networks IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.2, February 2012 33 Dynamic Traffic Prioritization and TXOP Allocation in 802.11e Based Multihop Wireless Networks Dongho

More information

Measurement-based Static Load Modeling Using the PMU data Installed on the University Load

Measurement-based Static Load Modeling Using the PMU data Installed on the University Load Journal of Electrical Engineering & Technology Vol. 7, No. 5, pp. 653~658, 202 653 http://dx.doi.org/0.5370/jeet.202.7.5.653 Measurement-based Static Load Modeling Using the PMU data Installed on the University

More information

CSE/EE 461 Section 2

CSE/EE 461 Section 2 CSE/EE 461 Section 2 Latency in a store-and-forward network 4ms, 10MB/s B How long does it take to send a 2kB packet from to B? 2ms, 10MB/s C 2ms, 10MB/s B What if it has to pass through a node C? Plan

More information

ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE WIRELESS ETHERNET PERFORMANCE

ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE WIRELESS ETHERNET PERFORMANCE ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE WIRELESS ETHERNET PERFORMANCE Spring 2001 FINAL PROJECT Jim Chuang Tim Lee Marion Sum (jchuang@sfu.ca) (leetim@pmc-sierra.com) (marion_sum@pmc-sierra.bc.ca)

More information

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics History Ethernet Frames CSMA/CD Obsolete versions 10Mbps versions Segments Spanning Tree Protocol

More information

Dr./ Ahmed Mohamed Rabie Sayed

Dr./ Ahmed Mohamed Rabie Sayed 1 Dr./ Ahmed Mohamed Rabie Sayed 2 A network is a group of two or more computer systems linked together to exchange data and share resources, including expensive peripherals. 3 A local area network (LAN)

More information

CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Access Control ALOHA FDMA, TDMA, CDMA OSI Model Internetworking

More information

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Integrating Information Systems: Technology, Strategy, and Organizational Factors MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various

More information

ECSE 414 Fall 2014 Final Exam Solutions

ECSE 414 Fall 2014 Final Exam Solutions ECSE 414 Fall 2014 Final Exam Solutions Question 1 a. The five main layers of the internet protocol stack, along with the service provided by each, and the place where each is implemented are as follows:

More information

Telecommunication of Stabilizing Signals in Power Systems

Telecommunication of Stabilizing Signals in Power Systems Telecommunication of Stabilizing Signals in Power Systems Guillaume J. Raux, Ali Feliachi, and Matthew C. Valenti Advanced Power Engineering Research Center Lane Department of Computer Science & Electrical

More information

A Study on the Communication Agent Model for One-way Data Transfer System

A Study on the Communication Agent Model for One-way Data Transfer System , pp. 161-168 http://dx.doi.org/10.14257/ijsh.2015.9.10.18 A Study on the Communication Agent Model for One-way Data Transfer System Young-Chul Oh 1, Mi-Ran Han 2, Yongtae Shin 3 and Jong-Bae Kim 4* 1

More information

CN [Network Devices]

CN [Network Devices] Q`.1 Explain Repeater. A repeater is a device that operates only at the PHYSICAL layer. A repeater can be used to increase the length of the network by put the effect on the signal. It connects two segments

More information

LAN PROTOCOLS. Beulah A AP/CSE

LAN PROTOCOLS. Beulah A AP/CSE LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety

More information

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks , pp.282-286 http://dx.doi.org/10.14257/astl.2015.116.57 Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks Rae Hyeon Kim, Jeong Gon Kim 1 Department of

More information

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr. Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CARRIER SENSE MULTIPLE ACCESS (CSMA): Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA

More information

Development of MF-TDMA based Satellite Network System Simulation Model

Development of MF-TDMA based Satellite Network System Simulation Model International Global Navigation Satellite Systems Society IGNSS Symposium 2011 University of New South Wales, Sydney, NSW, Australia 15 17 November 2011 Development of MF-TDMA based Satellite Network System

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Additional Slides (Basics) Intermediate Systems

Additional Slides (Basics) Intermediate Systems Automation Systems Discrete Event Control Systems and Networked Automation Systems Additional Slides (Basics) Intermediate Systems Outline Building Larger (and more Reliable) Networks: Intermediate Systems

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C Networks Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 21 Homework, announcements New chapter (23) online No homework assigned today, sorry!

More information

Introduction to Ethernet. Guy Hutchison 8/30/2006

Introduction to Ethernet. Guy Hutchison 8/30/2006 Introduction to Ethernet Guy Hutchison 8/30/2006 What is Ethernet? Local area transport protocol Layer 2 of the OSI stack Zero/minimal configuration Low-cost, high performance Best-effort delivery Original

More information

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs Fairness Enhancement Scheme for Multimedia Applications in IEEE 802.11e Wireless LANs Young-Woo Nam, Sunmyeng Kim, and Si-Gwan Kim Department of Computer Software Engineering Kumoh National Institute of

More information

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Computer and Network Security

Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:

More information

Learning-based System for Detecting Abnormal Traffic and Host Control

Learning-based System for Detecting Abnormal Traffic and Host Control 196 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.7B, July 2006 Learning-based System for Detecting Abnormal Traffic and Host Control Changwoo Nam 1,Chanyeol Park 2, Huhnkuk

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Ethernet. Networks: Ethernet 1

Ethernet. Networks: Ethernet 1 Ethernet Networks: Ethernet 1 Ethernet [DEC, Intel, Xerox] 1-persistent, CSMA-CD with Binary Exponential Backoff Manchester encoding Networks: Ethernet 2 Ethernet [operational in 1974] Initially 3 Mbps

More information

1. Data Link Layer Protocols

1. Data Link Layer Protocols 1. Data Link Layer Protocols Purpose of the Data Link Layer The Data Link Layer Purpose of the Data Link Layer Data Link Sublayers Network LLC Sublayer Data Link Physical MAC Sublayer 802.3 Ethernet 802.11

More information

Performance Analysis for Channel Utilization in Wireless LAN

Performance Analysis for Channel Utilization in Wireless LAN Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people

More information

An Efficient Correspondent Registration to Reduce Signaling Overheads for Proxy Mobile IPv6

An Efficient Correspondent Registration to Reduce Signaling Overheads for Proxy Mobile IPv6 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 187 An Efficient Correspondent Registration to Reduce Signaling Overheads for Proxy Mobile IPv6 Pyung-Soo

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Local Area Networks. Ethernet LAN

Local Area Networks. Ethernet LAN Local Area Networks Ethernet 802.3 LAN -7-1 Local Area Networks (Lokale Netze) Wide Area Network LAN -7-2 Local Area Networks What is a LAN? Multiple systems attached to an often shared medium high total

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

A Network-Based Handover Scheme in HIP-Based Mobile Networks

A Network-Based Handover Scheme in HIP-Based Mobile Networks J Inf Process Syst, Vol.9, No.4, pp.651~659, December 2013 http://dx.doi.org/10.3745/jips.2013.9.4.651 pissn 1976-913X eissn 2092-805X A Network-Based Handover Scheme in HIP-Based Mobile Networks Moneeb

More information

GAYATRI COMPUTERS Prepared by : VENKAT.G 1. Module 1: NETWORK BASICS

GAYATRI COMPUTERS Prepared by : VENKAT.G 1. Module 1: NETWORK BASICS GAYATRI COMPUTERS Prepared by : VENKAT.G 1 What is Networking? Module 1: NETWORK BASICS Networking: Connecting two or more computers or network devices(routers/print Servers / Firewall Devices..etc) for

More information

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?

More information

CS61C Machine Structures Lecture 37 Networks. No Machine is an Island!

CS61C Machine Structures Lecture 37 Networks. No Machine is an Island! CS61C Machine Structures Lecture 37 Networks April 24, 2006 John Wawrzynek Page 1 No Machine is an Island! Computer Processor (active) Control ( brain ) Datapath ( brawn ) Memory (passive) (where programs,

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Link Layer. (continued)

Link Layer. (continued) Link Layer (continued) Topics 1. Framing Delimiting start/end of frames 2. Error detection and correction Handling errors 3. Retransmissions Handling loss 4. Multiple Access 802.11, classic Ethernet 5.

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Sunmyeng Kim Department of Computer Software Engineering, Kumoh National Institute of Technology 1 Daehak-ro, Gumi,

More information

Code No: RR Set No. 1

Code No: RR Set No. 1 Code No: RR320503 Set No. 1 III B.Tech II Semester Regular Examinations, Apr/May 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering,

More information

High Performance Distributed Coordination Function for Wireless LANs

High Performance Distributed Coordination Function for Wireless LANs High Performance Distributed Coordination Function for Wireless LANs Haithem Al-Mefleh and J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University, Ames, IA 511, USA {almehai,morris}@iastate.edu

More information

The effect of Mobile IP handoffs on the performance of TCP

The effect of Mobile IP handoffs on the performance of TCP Mobile Networks and Applications 4 (1999) 131 135 131 The effect of Mobile IP handoffs on the performance of TCP Anne Fladenmuller a and Ranil De Silva b a Alcatel CIT, Software Department, Route de Nozay,

More information

The Impact of CSMA/CD and Token Ring on System Performance and Stability of Integrated Wired and Wireless Networks

The Impact of CSMA/CD and Token Ring on System Performance and Stability of Integrated Wired and Wireless Networks The Impact of CSMA/CD and Token Ring on System Performance and Stability of Integrated Wired and Wireless Networks Khalid Khanfar The Arab Academy for Banking and Financial Sciences kkhanfar@aabfs.org

More information

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks

More information

Internet A Brief Tutorial. Jean Walrand EECS U.C. Berkeley

Internet A Brief Tutorial. Jean Walrand EECS U.C. Berkeley Internet A Brief Tutorial Jean Walrand EECS U.C. Berkeley Contents History Key Ideas Protocols Technology Research History 1962 L. Kleinrock proposes Packet Switching 1966 L. Roberts proposes architecture

More information

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Underlying Technology TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. OBJECTIVES: To briefly discuss the technology of dominant

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information